You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/src/main/sphinx/security/ranger-access-control.md
+34-20Lines changed: 34 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,25 +9,28 @@ column-masking, row-filtering and audit logging.
9
9
10
10
* Access to a Apache Ranger deployment with the desired authorization policies.
11
11
* Access to an audit store using Solr, HDFS, Log4J, or S3 to save audit logs.
12
-
* Apache Ranger 2.5.0 and greater include the required Trino service definition. Earlier versions of Apache Ranger require an update of the service definition available in the version [here](
<!-- properties used for 2-way SSL between the Trino plugin and Apache Ranger server -->
@@ -161,7 +169,13 @@ The following table lists the configuration properties for the Ranger access con
161
169
162
170
## Required policies
163
171
164
-
* Users will need permission to execute queries in Trino. Without a policy in Apache Ranger to grant this permission, users will not be able to execute any query.
165
-
* To allow this, create a policy in Apache Ranger for `queryId` resource having value `*`, with `execute` permission for user `{USER}`.
166
-
* Users will need permission to impersonate themselves in Trino. Without a policy in Apache Ranger to grant this permission, users will not be able to execute any query.
167
-
* To allow this, create a policy in Apache Ranger for `trinouser` resource having value `{USER}`, with `impersonate` permission for user `{USER}`.
172
+
* Users must have permission to execute queries in Trino. Without a policy in
173
+
Apache Ranger to grant this permission, users are not be able to execute any
174
+
query.
175
+
* To allow this, create a policy in Apache Ranger for a `queryId` resource
176
+
with a value `*` and with the `execute` permission for the user `{USER}`.
177
+
* Users must have permission to impersonate themselves in Trino. Without a
178
+
policy in Apache Ranger to grant this permission, users are not able to
179
+
execute any query.
180
+
* To allow this, create a policy in Apache Ranger for a `trinouser` resource
181
+
with value `{USER}` and with the `impersonate` permission for user `{USER}`.
0 commit comments